Global Variables. Global Dictionary. Pool Dictionaries. Chapter

Size: px
Start display at page:

Download "Global Variables. Global Dictionary. Pool Dictionaries. Chapter"

Transcription

1 Chapter 7 Global Variables I'll start with the standard caveat that global variables should be used sparingly, if at all, and that most information should stored in instance variables or be passed as method arguments. Having said that, there is a definite use for global information and objects. You may have constants that are used through your system, or you may have global objects such as configuration objects or trace log objects. Let's look at some techniques that can be used for these purposes. We'll use two examples: a configuration object and a timeout value. Global Dictionary The most basic technique is to put global objects in the system dictionary named Smalltalk since objects in Smalltalk can be referenced from anywhere. For example, you might have code that does: Smalltalk at: #Timeout put: 20. Smalltalk at: #Config put: MyConfiguration new. I recommend against using Smalltalk for application globals because it's used heavily by the Smalltalk system (for example, it contains all the classes in the system, and global variables such as Transcript, Processor, and ScheduledControllers). I prefer not to clutter Smalltalk up with application objects or risk name collisions. Pool Dictionaries The next technique is to use a PoolDictionary. A PoolDictionary contains objects to which you want global access for your application. The nice thing about a PoolDictionary is that classes have to register an interest in it before they can access its objects, so it allows you a certain amount of scoping. The way a class registers an interest is to name the PoolDictionary in the appropriate line in the class definition template. (In VisualWorks 2.0, subclasses inherit the PoolDictionary, but in VisualWorks 2.5, you have to explicitly name the PoolDictionary in each subclass that wants to reference PoolDictionary variables.) In the example below, I've called it MyPoolDictionary. NameOfSuperclass subclass: #NameOfClass instancevariablenames: 'instvarname1 instvarname2' Copyright 1997 by Alec Sharp Download more free Smalltalk-Books at: - The University of Berne: - European Smalltalk Users Group:

2 Global Variables 2 classvariablenames: 'ClassVarName1 ClassVarName2' pooldictionaries: 'MyPoolDictionary' category: 'MyStuff' Before you write code you must have done two things. First, before referencing the PoolDictionary in your class definition you have to make the name of the PoolDictionary universally known by adding it to the Smalltalk dictionary. To do this, execute the following. Note that we are using a Dictionary and not an IdentityDictionary. Because of the way an IdentityDictionary is implemented, it will not work as a PoolDictionary. Smalltalk at: #MyPoolDictionary put: Dictionary new. Before you write code referencing the objects in the PoolDictionary, you have to add these objects to the PoolDictionary so that the compiler can associate a variable name in your method with an object in the PoolDictionary. However, the compiler just needs to be able to reference the name in the PoolDictionary and doesn't care about the type of the object. For the purpose of accepting your method, the easiest thing to say initially is: MyPoolDictionary at: #Config put: nil. We don't want to do these steps manually every time we file in our code (see Chapter 33, Managing Source Code, for more information on managing projects and filing in code). So, at the beginning of the file that files in our code, we add the following. Smalltalk at: #MyPoolDictionary put: Dictionary new. MyPoolDictionary at: #Config put: nil. If you have code that refers to PoolDictionary variables and you create a new PoolDictionary, the code will no longer be able to find the old variables. If you get an error in a method because a PoolDictionary variable is not found, and yet a PoolDictionary exists with the appropriate variable, recompile the method by making a small change and accepting the method. If this solves the problem, somewhere you created a new PoolDictionary while code still references the old one. The question that always comes up when using a PoolDictionary is how do you find all the references to an object in your PoolDictionary, since you can't browse References To or Implementors Of? The answer is to evaluate the following code: Browser browseallcallson: (MyPoolDictionary associationat: #Config). It might be worth putting something like this in your Workspace and saving your image. VisualWorks 1.0 had a menu option to open the System Workspace which, among other useful code samples, had code to find PoolDictionary variable references. The System Workspace is not obviously available in VisualWorks 2.0 or 2.5, but you can get it by executing: ComposedTextView opensystemworkspace. Advantages of using a PoolDictionary are: you refer to the objects in a PoolDictionary by a name starting with an uppercase letter, which makes it very obvious that the code references a global object; and, only classes with an interest in the PoolDictionary have access to it. Disadvantages of PoolDictionaries are: you have to take

3 Global Variables 3 specific actions to allow PoolDictionary objects to be referenced, and it is harder to find all the references to the PoolDictionary object. Class side variables The next technique is to use a class to store global data. For example, we might have two classes: MyGlobals and MyConstants. Global and constant values are referenced by sending messages to the appropriate class. For example, we might reference and define a timeout value as follows. MyClass>>myMethod timeout := MyConstants timeout.... MyConstants class>>timeout ^20 We might reference and initialize a global value (in this case a Log file) as fillows. MyClass>>myMethod... MyGlobals logfile log: 'salary=', salary printstring. MyGlobals class>>logfile ^LogFile MyGlobals class>>initialize LogFile := MyLogFile on: self logfilename. To find all references to an individual global, we can browse references to the message that returns the global. To see all the places that any global is used, we can browse class references for MyGlobals. Similarly, for constant values. Unlike with variables in a PoolDictionary, we don't have to do anything special on filein, and we don't have to make sure that the reference contains an object when we write methods that refer to constants and globals. The only disadvantages of this approach over a PoolDictionary are that you can't restrict scope in the same way, and you have a class that does not act as a factory for instances. Default instances There's one other thing to talk about since we are on the topic of class side behavior. Sometimes you have a single instance of a class that you want to access from many places. Our Configuration object may be such an example. There's a definite temptation to say that there will never be more than one instance of this class, so we might as well just dispense with the instance and put all the information and behavior on the class side. That way you can access the behavior easily since class names are globally known. Despite the temptation, it should be resisted. There's another way that allows similar ease of access without preventing you from creating additional instances. Suppose the class is MyClass. Define a class variable called

4 Global Variables 4 Default. On the class side, create a class initialization protocol with an initialize method 1. In the class side initialize method do the following: MyClass class>>initialize "self initialize" Default := self new. You'll probably need to initalize the instance so you'll either need to write new, which invokes initialize, or in the class initalize method do Default := self new initalize. Then on the class side write a default method: MyClass class>>default ^Default In your application code, you can now write code such as: length := MyClass default length. If you want to get really fancy, you can assume that instance side messages being sent to the class are really intended for the default instance. You'd write the last example as: length := MyClass length. Given that the class doesn't understand the length message, how do we make this work? We can implement length on the class side as ^self default length, or we can implement the method doesnotunderstand: on the class side as follows. MyClass class>>doesnotunderstand: amessage ^self default perform: amessage selector witharguments: amessage arguments I don't particularly recommend this way of coding because it's not obvious how it's working, but hey, it's ideas like this that make Smalltalk so much fun. If you decide to use this technique, make sure your class comments contain explicit information about what you are doing. Environment Variables / Command Line Arguments Environment variables and command line arguments are not global variables, but since the information is globally available, and varies depending on the environment and how the image was invoked, we'll mention them here. The following returns an array containing the command line arguments. The first element is the program name and the second is the image name. Any additional array elements will be other command line arguments you added. CEnvironment commandline. 1 Class initialization is only done on filein so it's a good idea to always put self initialize in comments at the start of class side initalize methods. That way you can reinitialize the class if you make changes to initialize. Of course, you can select the whole method and doit, but having self initialize makes it more obvious that it may need to be done.

5 Global Variables 5 You can also retrieve environment variables using getenv:. For example, CEnvironment getenv: 'LOGNAME' Image Version Number The version number for your image can be discovered in one of two ways. You can send the version message to Smalltalk, or the versionid message to ObjectMemory. For example, on a VW 2.0 system, I get the following. Smalltalk version 'VisualWorks(R) Release 2.0 of 4 August 1994' ObjectMemory versionid #[ ]. In particular, element 5 of the array returned by versionid is the image major version number. VW 2.0 gives 20, while VW 2.5 gives 25. So, to discover if you are using VW 2.0 you could do either of the following. (Smalltalk version findstring: '2.0' startingat: 1) > 0 (ObjectMemory versionid at: 5) == 20

Instance Creation. Chapter

Instance Creation. Chapter Chapter 5 Instance Creation We've now covered enough material to look more closely at creating instances of a class. The basic instance creation message is new, which returns a new instance of the class.

More information

Copyright 1997 by Alec Sharp PDF-Conversion by Lukas Renggli Download more free Smalltalk-Books at: The University of Berne:

Copyright 1997 by Alec Sharp PDF-Conversion by Lukas Renggli Download more free Smalltalk-Books at: The University of Berne: Copyright 1997 by Alec Sharp PDF-Conversion by Lukas Renggli Download more free Smalltalk-Books at: The University of Berne: http://www.iam.unibe.ch/~ducasse/webpages/freebooks.html European Smalltalk

More information

filename := Filename named: 'c:\basedir\file.ext'. filename := 'c:\basedir\file.ext' asfilename.

filename := Filename named: 'c:\basedir\file.ext'. filename := 'c:\basedir\file.ext' asfilename. Chapter 14 Files In this chapter we will be looking at buffered reading and writing of files, which is all you will need for most file access. Non-buffered I/O is beyond the scope of this book; however,

More information

Simple Document Management Using VFP, Part 1 Russell Campbell russcampbell@interthink.com

Simple Document Management Using VFP, Part 1 Russell Campbell russcampbell@interthink.com Seite 1 von 5 Issue Date: FoxTalk November 2000 Simple Document Management Using VFP, Part 1 Russell Campbell russcampbell@interthink.com Some clients seem to be under the impression that they need to

More information

The Smalltalk Programming Language. Beatrice Åkerblom beatrice@dsv.su.se

The Smalltalk Programming Language. Beatrice Åkerblom beatrice@dsv.su.se The Smalltalk Programming Language Beatrice Åkerblom beatrice@dsv.su.se 'The best way to predict the future is to invent it' - Alan Kay. History of Smalltalk Influenced by Lisp and Simula Object-oriented

More information

My Secure Backup: How to reduce your backup size

My Secure Backup: How to reduce your backup size My Secure Backup: How to reduce your backup size As time passes, we find our backups getting bigger and bigger, causing increased space charges. This paper takes a few Newsletter and other articles I've

More information

Capturing Network Traffic With Wireshark

Capturing Network Traffic With Wireshark Capturing Network Traffic With Wireshark A White Paper From For more information, see our web site at Capturing Network Traffic with Wireshark Last Updated: 02/26/2013 In some cases, the easiest way to

More information

Using Term to Pierce an Internet Firewall mini HOWTO

Using Term to Pierce an Internet Firewall mini HOWTO Using Term to Pierce an Internet Firewall mini HOWTO Barak Pearlmutter bap@cs.unm.edu David C. Merrill david@lupercalia.net Copyright 1996 by Barak Pearlmutter Copyright 2001 by David C. Merrill Revision

More information

A Guide To Evaluating a Bug Tracking System

A Guide To Evaluating a Bug Tracking System A Guide To Evaluating a Bug Tracking System White Paper By Stephen Blair, MetaQuest Software Published: October, 2004 Abstract Evaluating a bug tracking system requires that you understand how specific

More information

5. At the Windows Component panel, select the Internet Information Services (IIS) checkbox, and then hit Next.

5. At the Windows Component panel, select the Internet Information Services (IIS) checkbox, and then hit Next. Installing IIS on Windows XP 1. Start 2. Go to Control Panel 3. Go to Add or RemovePrograms 4. Go to Add/Remove Windows Components 5. At the Windows Component panel, select the Internet Information Services

More information

Using Google Docs in the classroom: Simple as ABC

Using Google Docs in the classroom: Simple as ABC What is Google Docs? Google Docs is a free, Web-based word processing, presentations and spreadsheets program. Unlike desktop software, Google Docs lets people create web-based documents, presentations

More information

Text of Email Templates

Text of Email Templates Text of Email Templates After Sale Follow-up Congratulations on the sale of your property! While I'm sure you have many memories there, it's time to open a new chapter in your life. I want you to know

More information

Tunnel Client FAQ. Table of Contents. Version 0v5, November 2014 Revised: Kate Lance Author: Karl Auer

Tunnel Client FAQ. Table of Contents. Version 0v5, November 2014 Revised: Kate Lance Author: Karl Auer Tunnel Client FAQ Version 0v5, November 2014 Revised: Kate Lance Author: Karl Auer Table of Contents A. Tunnelling 1 How does tunnelling work? 2 What operating systems are supported? 3 Where can I get

More information

A Java Crib Sheet. First: Find the Command Line

A Java Crib Sheet. First: Find the Command Line A Java Crib Sheet Unlike JavaScript, which is pretty much ready-to-go on any computer with a modern Web browser, Java might be a more complex affair However, logging some time with Java can be fairly valuable,

More information

SyncTool for InterSystems Caché and Ensemble.

SyncTool for InterSystems Caché and Ensemble. SyncTool for InterSystems Caché and Ensemble. Table of contents Introduction...4 Definitions...4 System requirements...4 Installation...5 How to use SyncTool...5 Configuration...5 Example for Group objects

More information

Subversion Server for Windows

Subversion Server for Windows Subversion Server for Windows VisualSVN Team VisualSVN Server: Subversion Server for Windows VisualSVN Team Copyright 2005-2008 VisualSVN Team Windows is a registered trademark of Microsoft Corporation.

More information

Get Your Project Back In Shape! How A Few Techniques Can Change Your (Project s) Life

Get Your Project Back In Shape! How A Few Techniques Can Change Your (Project s) Life Get Your Project Back In Shape! How A Few Techniques Can Change Your (Project s) Life About me Founder and director of objektfabrik Business Informatics (Banking) Smalltalk since 1996 (VA Smalltalk, VisualWorks,

More information

SOLoist Automation of Class IDs Assignment

SOLoist Automation of Class IDs Assignment SOL Software d.o.o. www.sol.rs Public SOLoist Automation of Class IDs Assignment Project: SOLoist V4 Document Type: Project Documentation (PD) Document Version:. Date:.6.25 SOLoist - Trademark of SOL Software

More information

LDAP and Active Directory Guide

LDAP and Active Directory Guide LDAP and Active Directory Guide Contents LDAP and Active Directory Guide...2 Overview...2 Configuring for LDAP During Setup...2 Deciding How to Use Data from LDAP... 2 Starting the Setup Tool... 3 Configuring

More information

Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.

Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder. CMSC 355 Lab 3 : Penetration Testing Tools Due: September 31, 2010 In the previous lab, we used some basic system administration tools to figure out which programs where running on a system and which files

More information

Deploying Microsoft Operations Manager with the BIG-IP system and icontrol

Deploying Microsoft Operations Manager with the BIG-IP system and icontrol Deployment Guide Deploying Microsoft Operations Manager with the BIG-IP system and icontrol Deploying Microsoft Operations Manager with the BIG-IP system and icontrol Welcome to the BIG-IP LTM system -

More information

ESA FAQ. E-mail Self Administration Frequently Asked Questions

ESA FAQ. E-mail Self Administration Frequently Asked Questions E-mail Self Administration Frequently Asked Questions Contents ESA FAQ...2 How do I... Log in?...2 How do I... Add a new e-mail address?...2 How do I... Add a new mailbox?...3 How do I... Add a new alias?...4

More information

eg Enterprise v5.2 Clariion SAN storage system eg Enterprise v5.6

eg Enterprise v5.2 Clariion SAN storage system eg Enterprise v5.6 EMC Configuring Clariion and SAN and Monitoring Monitoring storage an system EMC an eg Enterprise v5.2 Clariion SAN storage system eg Enterprise v5.6 Restricted Rights Legend The information contained

More information

Setting Up the Site Licenses

Setting Up the Site Licenses XC LICENSE SERVER Setting Up the Site Licenses INTRODUCTION To complete the installation of an XC Site License, create an options file that includes the Host Name (computer s name) of each client machine.

More information

QaTraq Pro Scripts Manual - Professional Test Scripts Module for QaTraq. QaTraq Pro Scripts. Professional Test Scripts Module for QaTraq

QaTraq Pro Scripts Manual - Professional Test Scripts Module for QaTraq. QaTraq Pro Scripts. Professional Test Scripts Module for QaTraq QaTraq Pro Scripts Professional Test Scripts Module for QaTraq QaTraq Professional Modules QaTraq Professional Modules are a range of plug in modules designed to give you even more visibility and control

More information

Part II. Managing Issues

Part II. Managing Issues Managing Issues Part II. Managing Issues If projects are the most important part of Redmine, then issues are the second most important. Projects are where you describe what to do, bring everyone together,

More information

EPiServer Operator's Guide

EPiServer Operator's Guide EPiServer Operator's Guide Abstract This document is mainly intended for administrators and developers that operate EPiServer or want to learn more about EPiServer's operating environment. The document

More information

Installation & User Guide

Installation & User Guide SharePoint List Filter Plus Web Part Installation & User Guide Copyright 2005-2009 KWizCom Corporation. All rights reserved. Company Headquarters P.O. Box #38514 North York, Ontario M2K 2Y5 Canada E-mail:

More information

SUnit Explained. 1. Testing and Tests. Stéphane Ducasse

SUnit Explained. 1. Testing and Tests. Stéphane Ducasse 1. SUnit Explained Stéphane Ducasse ducasse@iam.unibe.ch http://www.iam.unibe.ch/~ducasse/ Note for the reader: This article is a first draft version of the paper I would like to have. I would like to

More information

How To Restore Your Data On A Backup By Mozy (Windows) On A Pc Or Macbook Or Macintosh (Windows 2) On Your Computer Or Mac) On An Pc Or Ipad (Windows 3) On Pc Or Pc Or Micro

How To Restore Your Data On A Backup By Mozy (Windows) On A Pc Or Macbook Or Macintosh (Windows 2) On Your Computer Or Mac) On An Pc Or Ipad (Windows 3) On Pc Or Pc Or Micro Online Backup by Mozy Restore Common Questions Document Revision Date: June 29, 2012 Online Backup by Mozy Common Questions 1 How do I restore my data? There are five ways of restoring your data: 1) Performing

More information

About Kobo Desktop...5. About Kobo Desktop...5. Downloading and installing Kobo Desktop...7. Buying ebooks with Kobo Desktop...10. Buying a book...

About Kobo Desktop...5. About Kobo Desktop...5. Downloading and installing Kobo Desktop...7. Buying ebooks with Kobo Desktop...10. Buying a book... Kobo Desktop User Guide Table of Contents About Kobo Desktop...5 About Kobo Desktop...5 Downloading and installing Kobo Desktop...7 Getting Kobo Desktop...7 Installing Kobo Desktop for Windows...8 Installing

More information

Version control. with git and GitHub. Karl Broman. Biostatistics & Medical Informatics, UW Madison

Version control. with git and GitHub. Karl Broman. Biostatistics & Medical Informatics, UW Madison Version control with git and GitHub Karl Broman Biostatistics & Medical Informatics, UW Madison kbroman.org github.com/kbroman @kwbroman Course web: kbroman.org/tools4rr Slides prepared with Sam Younkin

More information

How To Link Tomcat 5 with IIS 6 on Windows 2003 Server using the JK2 ajp13 connector

How To Link Tomcat 5 with IIS 6 on Windows 2003 Server using the JK2 ajp13 connector How To Link Tomcat 5 with IIS 6 on Windows 2003 Server using the JK2 ajp13 connector Copyright 2003 TJ and 2XP Group (uk.co.2xp@tj.support) Contents 1. History 2. Introduction 3. Summary 4. Prerequisites

More information

After you install Spark, you'll get going by logging in and adding contacts. Try out a chat with one of your contacts!

After you install Spark, you'll get going by logging in and adding contacts. Try out a chat with one of your contacts! Spark User Guide Welcome to Spark! This guide will get you acquainted with the basics of chatting using Spark. You'll get logged in, add contacts, chat by text and voice, exchange files, and more. Note:

More information

Backing up Data. You have lots of different options for backing up data, different methods offer different protection.

Backing up Data. You have lots of different options for backing up data, different methods offer different protection. Backing up Data Why Should I Backup My Data? In these modern days more and more is saved on to your computer. Sometimes its important work you can't afford to lose, it could also be music, photos, videos

More information

Beginning BGP. Peter J. Welcher. Introduction. When Do We Need BGP?

Beginning BGP. Peter J. Welcher. Introduction. When Do We Need BGP? Beginning BGP Peter J. Welcher Introduction At the time I'm writing this, it is time to register for Networkers / CCIE recertification. I just signed up for Denver. You'll probably be reading this around

More information

Look for the 'BAERCOM Instruction Manual' link in Blue very near the bottom.

Look for the 'BAERCOM Instruction Manual' link in Blue very near the bottom. Baercom v2.1 Install Package Electronic CD Download and Installation Preparation Release Notes and Instructions UFI -- www.ufiservingscience.com 7-2014 General Comments Note that the current instructions

More information

Document Services Online Customer Guide

Document Services Online Customer Guide Document Services Online Customer Guide Logging in... 3 Registering an Account... 3 Navigating DSO... 4 Basic Orders... 5 Getting Started... 5 Attaching Files & Print Options... 7 Advanced Print Options

More information

NRPE Documentation CONTENTS. 1. Introduction... a) Purpose... b) Design Overview... 2. Example Uses... a) Direct Checks... b) Indirect Checks...

NRPE Documentation CONTENTS. 1. Introduction... a) Purpose... b) Design Overview... 2. Example Uses... a) Direct Checks... b) Indirect Checks... Copyright (c) 1999-2007 Ethan Galstad Last Updated: May 1, 2007 CONTENTS Section 1. Introduction... a) Purpose... b) Design Overview... 2. Example Uses... a) Direct Checks... b) Indirect Checks... 3. Installation...

More information

USC Marshall School of Business ShareFile_With_Outlook_Client_v2.docx 6/12/13 1 of 9

USC Marshall School of Business ShareFile_With_Outlook_Client_v2.docx 6/12/13 1 of 9 About ShareFile When you wish to send someone a file or need a file from someone else, your best option is to use ShareFile. It not only provides increased security by automatically encrypting files but

More information

Talk2M ewon Internet Connection How To

Talk2M ewon Internet Connection How To AUG: 003 Rev.: 1.0 How To GPRS Contents: This guide will explain how to set up the Internet connection of your ewon for the Talk2M connection. Table of Contents 1. Hardware and software requirements...

More information

Deploying the BIG-IP LTM system and Microsoft Windows Server 2003 Terminal Services

Deploying the BIG-IP LTM system and Microsoft Windows Server 2003 Terminal Services Deployment Guide Deploying the BIG-IP System with Microsoft Windows Server 2003 Terminal Services Deploying the BIG-IP LTM system and Microsoft Windows Server 2003 Terminal Services Welcome to the BIG-IP

More information

Object Oriented Programming and the Objective-C Programming Language 1.0. (Retired Document)

Object Oriented Programming and the Objective-C Programming Language 1.0. (Retired Document) Object Oriented Programming and the Objective-C Programming Language 1.0 (Retired Document) Contents Introduction to The Objective-C Programming Language 1.0 7 Who Should Read This Document 7 Organization

More information

Why you shouldn't use set (and what you should use instead) Matt Austern

Why you shouldn't use set (and what you should use instead) Matt Austern Why you shouldn't use set (and what you should use instead) Matt Austern Everything in the standard C++ library is there for a reason, but it isn't always obvious what that reason is. The standard isn't

More information

Load Balancing BEA WebLogic Servers with F5 Networks BIG-IP

Load Balancing BEA WebLogic Servers with F5 Networks BIG-IP Load Balancing BEA WebLogic Servers with F5 Networks BIG-IP Introducing BIG-IP load balancing for BEA WebLogic Server Configuring the BIG-IP for load balancing WebLogic Servers Introducing BIG-IP load

More information

CA Nimsoft Service Desk

CA Nimsoft Service Desk CA Nimsoft Service Desk Configure Outbound Web Services 7.13.7 Legal Notices Copyright 2013, CA. All rights reserved. Warranty The material contained in this document is provided "as is," and is subject

More information

The Settings tab: Check Uncheck Uncheck

The Settings tab: Check Uncheck Uncheck Hi! This tutorial shows you, the soon-to-be proud owner of a chatroom application, what the &^$*^*! you are supposed to do to make one. First no, don't do that. Stop it. Really, leave it alone. Good. First,

More information

Setting Up Your FTP Server

Setting Up Your FTP Server Requirements:! A computer dedicated to FTP server only! Linksys router! TCP/IP internet connection Steps: Getting Started Configure Static IP on the FTP Server Computer: Setting Up Your FTP Server 1. This

More information

Installation & User Guide

Installation & User Guide SharePoint List Filter Plus Web Part Installation & User Guide Copyright 2005-2011 KWizCom Corporation. All rights reserved. Company Headquarters KWizCom 50 McIntosh Drive, Unit 109 Markham, Ontario ON

More information

Chronoforums. Written by ClubAero.nl, 8 th December 2013

Chronoforums. Written by ClubAero.nl, 8 th December 2013 Written by ClubAero.nl, 8 th December 2013 Chronoforums ClubAero.nl is an association set up in the Netherlands to lease or charter a regional airliner for short single day or weekend ski-trips. After

More information

Chapter 6 Using Network Monitoring Tools

Chapter 6 Using Network Monitoring Tools Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your Wireless-G Router Model WGR614v9. You can access these features by selecting the items under

More information

Using the ISCR FTP Program

Using the ISCR FTP Program Using the ISCR FTP Program (RMCDS Configuration) This document was last modified August 29, 2011 This document explains how to make a backup of cases in RMCDS (Rocky Mountain Cancer Data Systems) and send

More information

SlimDrivers User Manual

SlimDrivers User Manual SlimDrivers User Manual Introduction: What are Updates? Updates are corrections to the software on your computer that are made to fix errors or to improve the overall performance of a particular program

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions What is Xythos? Xythos is a secure web-based file storage system that allows you to place files in a central location so they can be accessed via the internet. You can upload,

More information

Oracle Application Server 10.1.3 for JDeveloper Beginners

Oracle Application Server 10.1.3 for JDeveloper Beginners Oracle Application Server 10.1.3 for JDeveloper Beginners So you've built your first JDeveloper web application using the 1001 Oracle examples. You're boss is impressed. "Wow, that's one of the best web-pages

More information

Version 1.0 January 2011. Xerox Phaser 3635MFP Extensible Interface Platform

Version 1.0 January 2011. Xerox Phaser 3635MFP Extensible Interface Platform Version 1.0 January 2011 Xerox Phaser 3635MFP 2011 Xerox Corporation. XEROX and XEROX and Design are trademarks of Xerox Corporation in the United States and/or other countries. Changes are periodically

More information

mylittleadmin for MS SQL Server 2005 from a Webhosting Perspective Anthony Wilko President, Infuseweb LLC

mylittleadmin for MS SQL Server 2005 from a Webhosting Perspective Anthony Wilko President, Infuseweb LLC mylittleadmin for MS SQL Server 2005 from a Webhosting Perspective Anthony Wilko President, Infuseweb LLC April 2008 Introduction f there's one thing constant in the IT and hosting industries, it's that

More information

Datalogic Desktop Utility

Datalogic Desktop Utility Datalogic Desktop Utility User s Manual Datalogic Mobile S.r.l. Via S. Vitalino 13 40012 - Lippo di Calderara di Reno Bologna - Italy Datalogic Desktop Utility Ed.: 07/2008 ALL RIGHTS RESERVED Datalogic

More information

Publishing Geoprocessing Services Tutorial

Publishing Geoprocessing Services Tutorial Publishing Geoprocessing Services Tutorial Copyright 1995-2010 Esri All rights reserved. Table of Contents Tutorial: Publishing a geoprocessing service........................ 3 Copyright 1995-2010 ESRI,

More information

$ftp = Net::FTP->new("some.host.name", Debug => 0) or die "Cannot connect to some.host.name: $@";

$ftp = Net::FTP->new(some.host.name, Debug => 0) or die Cannot connect to some.host.name: $@; NAME Net::FTP - FTP Client class SYNOPSIS use Net::FTP; $ftp = Net::FTP->new("some.host.name", Debug => 0) or die "Cannot connect to some.host.name: $@"; $ftp->login("anonymous",'-anonymous@') or die "Cannot

More information

Populating Your Domino Directory (Or ANY Domino Database) With Tivoli Directory Integrator. Marie Scott Thomas Duffbert Duff

Populating Your Domino Directory (Or ANY Domino Database) With Tivoli Directory Integrator. Marie Scott Thomas Duffbert Duff Populating Your Domino Directory (Or ANY Domino Database) With Tivoli Directory Integrator Marie Scott Thomas Duffbert Duff Agenda Introduction to TDI architecture/concepts Discuss TDI entitlement Examples

More information

for Android Windows Desktop and Conduit Quick Start Guide

for Android Windows Desktop and Conduit Quick Start Guide for Android Windows Desktop and Conduit Quick Start Guide HanDBase is a Registered Trademark of DDH Software, Inc. All information contained in this manual and all software applications mentioned in this

More information

ibaan ERP 5.2a Configuration Guide for ibaan ERP Windows Client

ibaan ERP 5.2a Configuration Guide for ibaan ERP Windows Client ibaan ERP 5.2a Configuration Guide for ibaan ERP Windows Client A publication of: Baan Development B.V. P.O.Box 143 3770 AC Barneveld The Netherlands Printed in the Netherlands Baan Development B.V. 2002.

More information

PHP Debugging. Draft: March 19, 2013 2013 Christopher Vickery

PHP Debugging. Draft: March 19, 2013 2013 Christopher Vickery PHP Debugging Draft: March 19, 2013 2013 Christopher Vickery Introduction Debugging is the art of locating errors in your code. There are three types of errors to deal with: 1. Syntax errors: When code

More information

Figure 1: Restore Tab

Figure 1: Restore Tab Apptix Online Backup by Mozy Restore How do I restore my data? There are five ways of restoring your data: 1) Performing a Restore Using the Restore Tab You can restore files from the Apptix Online Backup

More information

Selling On the Moon. the ecrater experience. http://cuppatea.ecrater.com

Selling On the Moon. the ecrater experience. http://cuppatea.ecrater.com Selling On the Moon by http://cuppatea.ecrater.com This document contains notes about what I have found in my own experiments at setting up an ecrater store. It is not sponsored by or affiliated with ecrater.

More information

Created With ScreenSteps Trial

Created With ScreenSteps Trial How to Make a DVD Clip Reel If you're showing film clips in class, you'll probably want to make a DVD clip reel -- your own DVD with the clips you want preloaded on it. That way you can avoid the frenzied

More information

IBM SPSS Statistics Version 22. Windows Installation Instructions (Concurrent License)

IBM SPSS Statistics Version 22. Windows Installation Instructions (Concurrent License) IBM SPSS Statistics Version 22 Windows Installation Instructions (Concurrent License) Contents Installation instructions........ 1 System requirements............ 1 Installing............... 1 Running

More information

Role Based Administration for LDMS 9.0 SP2

Role Based Administration for LDMS 9.0 SP2 Role Based Administration for LDMS 9.0 SP2 This article is designed to help you understand Role Based Administration for LDMS 9.0 SP2 and how to configure it. We will try to give you as much information

More information

Regain Your Privacy on the Internet

Regain Your Privacy on the Internet Regain Your Privacy on the Internet by Boris Loza, PhD, CISSP from SafePatrol Solutions Inc. You'd probably be surprised if you knew what information about yourself is available on the Internet! Do you

More information

Cincom Smalltalk. Application Developer's Guide P46-0101-14 SIMPLIFICATION THROUGH INNOVATION

Cincom Smalltalk. Application Developer's Guide P46-0101-14 SIMPLIFICATION THROUGH INNOVATION Cincom Smalltalk Application Developer's Guide P46-0101-14 SIMPLIFICATION THROUGH INNOVATION Copyright 1993 2009 by Cincom Systems, Inc. All rights reserved. This product contains copyrighted third-party

More information

Chapter 6 Using Network Monitoring Tools

Chapter 6 Using Network Monitoring Tools Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your RangeMax Wireless-N Gigabit Router WNR3500. You can access these features by selecting the items

More information

Microsoft Access Database

Microsoft Access Database 1 of 6 08-Jun-2010 12:38 Microsoft Access Database Introduction A Microsoft Access database is primarily a Windows file. It must have a location, also called a path, which indicates how the file can be

More information

Creating, Sharing, and Selling Buzztouch Plugins

Creating, Sharing, and Selling Buzztouch Plugins Plugins Market Creating, Sharing, and Selling Buzztouch Plugins Rev 11/20/2013 1 of 17 Table of Contents About Plugins... 4 What plugins do...4 Why plugins are necessary... 5 Who creates plugins... 5 How

More information

Developing In Eclipse, with ADT

Developing In Eclipse, with ADT Developing In Eclipse, with ADT Android Developers file://v:\android-sdk-windows\docs\guide\developing\eclipse-adt.html Page 1 of 12 Developing In Eclipse, with ADT The Android Development Tools (ADT)

More information

Cincom Smalltalk. Installation Guide P46-0105-17 SIMPLIFICATION THROUGH INNOVATION

Cincom Smalltalk. Installation Guide P46-0105-17 SIMPLIFICATION THROUGH INNOVATION Cincom Smalltalk Installation Guide P46-0105-17 SIMPLIFICATION THROUGH INNOVATION 1995 2011 by Cincom Systems, Inc. All rights reserved. This product contains copyrighted third-party software. Part Number:

More information

BEGINNER S ADMINISTRATION TUTORIAL for MEDAL OF HONOR: ALLIED ASSAULT by Crow King crowking@autokick.com

BEGINNER S ADMINISTRATION TUTORIAL for MEDAL OF HONOR: ALLIED ASSAULT by Crow King crowking@autokick.com BEGINNER S ADMINISTRATION TUTORIAL for MEDAL OF HONOR: ALLIED ASSAULT by Crow King crowking@autokick.com For more Administrator Support, please visit http://www.autokick.com/ 2003 DTOM, Inc. All Rights

More information

T320 E-business technologies: foundations and practice

T320 E-business technologies: foundations and practice T320 E-business technologies: foundations and practice Block 3 Part 2 Activity 2: Generating a client from WSDL Prepared for the course team by Neil Simpkins Introduction 1 WSDL for client access 2 Static

More information

Laserfiche Web Access 8 and Kerberos Configuration in a Windows Server 2008 and IIS 7 Environment. White Paper

Laserfiche Web Access 8 and Kerberos Configuration in a Windows Server 2008 and IIS 7 Environment. White Paper Laserfiche Web Access 8 and Kerberos Configuration in a Windows Server 2008 and IIS 7 Environment White Paper March 2009 The information contained in this document represents the current view of Compulink

More information

Outlook 2007: Managing your mailbox

Outlook 2007: Managing your mailbox Outlook 2007: Managing your mailbox Find its size and trim it down Use Mailbox Cleanup On the Tools menu, click Mailbox Cleanup. You can do any of the following from this one location: View the size of

More information

Getting Started With Halo for Windows For CloudPassage Halo

Getting Started With Halo for Windows For CloudPassage Halo Getting Started With Halo for Windows For CloudPassage Halo Protecting your Windows servers in a public or private cloud has become much easier and more secure, now that CloudPassage Halo is available

More information

Guidelines for Schools

Guidelines for Schools Guidelines for Schools How to set up a school account ebooksforschools.com Contents Guidelines for schools (How to set up a school account) Set up account...3 4 1 Creating a School Account... 4 2 Editing

More information

How To Check If Your Router Is Working Properly

How To Check If Your Router Is Working Properly Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your RangeMax Dual Band Wireless-N Router WNDR3300. You can access these features by selecting the

More information

Redeploying Microsoft CRM 3.0

Redeploying Microsoft CRM 3.0 Redeploying Microsoft CRM 3.0 2005 Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the example companies,

More information

User Terminal Service Constituent module IN-Lab report 93/8

User Terminal Service Constituent module IN-Lab report 93/8 User Terminal Service Constituent module IN-Lab report 93/8 Trygve Reenskaug, Taskon Carl Petter Swensson, Taskon 28 July 1993 The purpose of this module is to specify a terminal which may represent a

More information

SCF/FEF Evaluation of Nagios and Zabbix Monitoring Systems. Ed Simmonds and Jason Harrington 7/20/2009

SCF/FEF Evaluation of Nagios and Zabbix Monitoring Systems. Ed Simmonds and Jason Harrington 7/20/2009 SCF/FEF Evaluation of Nagios and Zabbix Monitoring Systems Ed Simmonds and Jason Harrington 7/20/2009 Introduction For FEF, a monitoring system must be capable of monitoring thousands of servers and tens

More information

Jive Case Escalation for Salesforce

Jive Case Escalation for Salesforce Jive Case Escalation for Salesforce TOC 2 Contents System Requirements... 3 Understanding Jive Case Escalation for Salesforce... 4 Setting Up Jive Case Escalation for Salesforce...5 Installing the Program...

More information

Mesa DMS. Once you access the Mesa Document Management link, you will see the following Mesa DMS - Microsoft Internet Explorer" window:

Mesa DMS. Once you access the Mesa Document Management link, you will see the following Mesa DMS - Microsoft Internet Explorer window: Mesa DMS Installing MesaDMS Once you access the Mesa Document Management link, you will see the following Mesa DMS - Microsoft Internet Explorer" window: IF you don't have the JAVA JRE installed, please

More information

Contents Using Jive Anywhere... ... 3

Contents Using Jive Anywhere... ... 3 Using Jive Anywhere TOC 2 Contents Using Jive Anywhere... 3 Jive Anywhere System Requirements...3 Installing Jive Anywhere in Your Browser...3 Configuring Jive Anywhere... 4 Who's Talking About This Web

More information

Using the Caché SQL Gateway

Using the Caché SQL Gateway Using the Caché SQL Gateway Version 2007.1 04 June 2007 InterSystems Corporation 1 Memorial Drive Cambridge MA 02142 www.intersystems.com Using the Caché SQL Gateway Caché Version 2007.1 04 June 2007 Copyright

More information

Configuring Microsoft Internet Information Service (IIS6 & IIS7)

Configuring Microsoft Internet Information Service (IIS6 & IIS7) Configuring Microsoft Internet Information Service (IIS6 & IIS7) Configuring Microsoft Internet Information Service (IIS6 & IIS7) Guide Last revised: June 25, 2012 Copyright 2012 Nexent Innovations Inc.

More information

Module 2 Cloud Computing

Module 2 Cloud Computing 1 of 9 07/07/2011 17:12 Module 2 Cloud Computing Module 2 Cloud Computing "Spending on IT cloud services will triple in the next 5 years, reaching $42 billion worlwide." In cloud computing, the word "cloud"

More information

Load Balancing IBM WebSphere Servers with F5 Networks BIG-IP System

Load Balancing IBM WebSphere Servers with F5 Networks BIG-IP System Load Balancing IBM WebSphere Servers with F5 Networks BIG-IP System Introducing BIG-IP load balancing for IBM WebSphere Server Configuring the BIG-IP for load balancing WebSphere servers Introducing BIG-IP

More information

Introduction to Securing Data in Transit

Introduction to Securing Data in Transit Introduction to Securing Data in Transit Jennifer Vesperman jenn@linuxchix.org 2002 02 24 Revision History Revision 0.1 2002 02 17 Revised by: MEG Converted from text file. Modified wording. Revision 0.2

More information

Answers Implementation Guide

Answers Implementation Guide Answers Implementation Guide Salesforce, Winter 16 @salesforcedocs Last updated: October 30, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com,

More information

REDUCING YOUR MICROSOFT OUTLOOK MAILBOX SIZE

REDUCING YOUR MICROSOFT OUTLOOK MAILBOX SIZE There are several ways to eliminate having too much email on the Exchange mail server. To reduce your mailbox size it is recommended that you practice the following tasks: Delete items from your Mailbox:

More information

Deploying the BIG-IP System with Oracle E-Business Suite 11i

Deploying the BIG-IP System with Oracle E-Business Suite 11i Deploying the BIG-IP System with Oracle E-Business Suite 11i Introducing the BIG-IP and Oracle 11i configuration Configuring the BIG-IP system for deployment with Oracle 11i Configuring the BIG-IP system

More information

SDK Code Examples Version 2.4.2

SDK Code Examples Version 2.4.2 Version 2.4.2 This edition of SDK Code Examples refers to version 2.4.2 of. This document created or updated on February 27, 2014. Please send your comments and suggestions to: Black Duck Software, Incorporated

More information

NNMi120 Network Node Manager i Software 9.x Essentials

NNMi120 Network Node Manager i Software 9.x Essentials NNMi120 Network Node Manager i Software 9.x Essentials Instructor-Led Training For versions 9.0 9.2 OVERVIEW This course is designed for those Network and/or System administrators tasked with the installation,

More information

Kaseya 2. User Guide. Version 6.1

Kaseya 2. User Guide. Version 6.1 Kaseya 2 Kaseya SQL Server Reporting Services (SSRS) Configuration User Guide Version 6.1 January 28, 2011 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and

More information